The 40-20-40 rule suggests that the least of amount of development effort be spent on
A. estimation and planning
B. analysis and design
C. testing
D. coding
Answer: D
Computer Science & Information Technology
You might also like to view...
One of the most commonly used_______-encryption algorithms is the Data Encryption Standard (DES).
a) symmetric. b) asymmetric. c) block. d) None of the above.
Computer Science & Information Technology
Which of the following risks relates to negative public opinion?
A) Operational risk B) Strategic risk C) Financial risk D) Reputational risk
Computer Science & Information Technology
The ________ function looks up values in a table array arranged as vertical columns
Fill in the blank(s) with correct word
Computer Science & Information Technology
Found in all folder windows, the ____ lets you know which folder you are viewing.?
A. ?address bar B. ?menu bar C. ?status bar D. ?navigation bar
Computer Science & Information Technology